Received: by 2002:ac0:bc90:0:0:0:0:0 with SMTP id a16csp1083371img; Mon, 18 Mar 2019 23:21:10 -0700 (PDT) X-Google-Smtp-Source: APXvYqxYVxAL8+tsvtfZBKnBuWYYJKmphcVo6XN1JbzLL/n45K3ZTb5BwDGayfwyIs3d7lUkcNa4 X-Received: by 2002:a63:4542:: with SMTP id u2mr297610pgk.291.1552976470564; Mon, 18 Mar 2019 23:21:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1552976470; cv=none; d=google.com; s=arc-20160816; b=fxqDqFGHTILPMmDmJllPM1+FrNceY23zA9UDDzeWaIhenG+zncetmWbO1UFlwnV6C9 ZoIDoFgF2UfxqRDc/KWgXYKuf8HV0qqSJrsCO7ZcJxArGvm7g8nyyTaVs4NqdOGH3cwX YIL/Mt9a6Nrr8figws0hRgX9FIMOZDy4OfPUA1FNLXRkDCW/Y5I7bvWomzvKdi18rmxx mU2r1cSEIBKkDWebWwbU9sLu+k1N4hbqRsSlWU4rKXwh7Q1XbK+55fQI9gBIozA75C8Z ZsSNvrAdfZ1hgCYmJyUfi/RKlBGbKmPKZW1KWIgLvF6uwxkAxvKfvDytkWQi9ssystoV eg1A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:cc:to:from :subject; bh=f8C9dX4KSyVUGjpPc+5CUNy5L+th+LQPLzNhdNdaPyg=; b=PyqdcTMQLMhuM1Sq92+UL6e46+nzw2LPDFypMFFi6qzB7a0Fz/R9EtlluWWQPuJfOE eUYluFaxqmXjbHlnG2+7WVKs0FWUAFZhebJwkQeifMvZaWnANcjJHfDl1xSzQX8f0fMU VJiu6yWFgLOwPoIA6wDI2vWTeC3Lgrbl5fg7dJS3oPvIVmfI0LALjZ6esr1Lqj3j5hhs orSYQV91Nvp+vthllVEK8dQJ3ld7lC8P+ZoLIIw/YTQMxHSF8+3kMImWi3vLsBLe6u/m 0WgQgOZf9ZoAMW5kSDwICKewBDqG0M+ZaKhC9UCPgve0/2YakIzeXCoWUV3ebu2nNzVS loJA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v2si1816800pgk.123.2019.03.18.23.20.55; Mon, 18 Mar 2019 23:21:10 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726910AbfCSGTB (ORCPT + 99 others); Tue, 19 Mar 2019 02:19:01 -0400 Received: from mga01.intel.com ([192.55.52.88]:8988 "EHLO mga01.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725996AbfCSGTA (ORCPT ); Tue, 19 Mar 2019 02:19:00 -0400 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga008.jf.intel.com ([10.7.209.65]) by fmsmga101.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 18 Mar 2019 23:18:59 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.58,496,1544515200"; d="scan'208";a="126620568" Received: from dwillia2-desk3.jf.intel.com (HELO dwillia2-desk3.amr.corp.intel.com) ([10.54.39.16]) by orsmga008.jf.intel.com with ESMTP; 18 Mar 2019 23:18:59 -0700 Subject: [PATCH 1/6] security/keys/encrypted: Allow operation without trusted.ko From: Dan Williams To: keyrings@vger.kernel.org Cc: James Bottomley , Roberto Sassu , Jarkko Sakkinen , Mimi Zohar , David Howells , vishal.l.verma@intel.com, linux-nvdimm@lists.01.org, linux-kernel@vger.kernel.org Date: Mon, 18 Mar 2019 23:06:20 -0700 Message-ID: <155297558061.2276575.9485856950730059730.stgit@dwillia2-desk3.amr.corp.intel.com> In-Reply-To: <155297557534.2276575.16264199708584900090.stgit@dwillia2-desk3.amr.corp.intel.com> References: <155297557534.2276575.16264199708584900090.stgit@dwillia2-desk3.amr.corp.intel.com> User-Agent: StGit/0.18-2-gc94f MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The trusted.ko module may fail to load. In the common case this failure is simply due to the platform missing a TPM. Teach the encrypted_keys implementation to lookup the key type by name rather than having a module dependency. Fixes: 240730437deb ("KEYS: trusted: explicitly use tpm_chip structure...") Suggested-by: James Bottomley Cc: Roberto Sassu Cc: Jarkko Sakkinen Cc: Mimi Zohar Cc: David Howells Signed-off-by: Dan Williams --- security/keys/encrypted-keys/masterkey_trusted.c | 11 ++++++++++- 1 file changed, 10 insertions(+), 1 deletion(-) diff --git a/security/keys/encrypted-keys/masterkey_trusted.c b/security/keys/encrypted-keys/masterkey_trusted.c index dc3d18cae642..7560aea6438d 100644 --- a/security/keys/encrypted-keys/masterkey_trusted.c +++ b/security/keys/encrypted-keys/masterkey_trusted.c @@ -19,6 +19,7 @@ #include #include #include "encrypted.h" +#include "../internal.h" /* * request_trusted_key - request the trusted key @@ -31,9 +32,15 @@ struct key *request_trusted_key(const char *trusted_desc, const u8 **master_key, size_t *master_keylen) { struct trusted_key_payload *tpayload; + struct key_type *type; struct key *tkey; - tkey = request_key(&key_type_trusted, trusted_desc, NULL); + type = key_type_lookup("trusted"); + if (IS_ERR(type)) { + tkey = (struct key *)type; + goto error; + } + tkey = request_key(type, trusted_desc, NULL); if (IS_ERR(tkey)) goto error; @@ -44,3 +51,5 @@ struct key *request_trusted_key(const char *trusted_desc, error: return tkey; } + +MODULE_SOFTDEP("pre: trusted");